> Any system is only as secure as it's programmed and it's 
> server shored up. Granted, if you're doing business on the 
> web in a manner that you're going to store credit cards, 
> then you better be able to afford to protect them, whether 
> it's PGP or other. My point is that PGP is not the end all 
> for storing credit cards. You CAN build other systems. Face 
> it, depending on the ability of the hacker, they can get at 
> the cards, no matter where they are. One big problem is when 
> folks put the numbers in databases that are in their web 
> directories. Amazingly, even a short time ago, several high
> profile sites were storing credit card numbers in databases 
> what were downloadable with a URL. Never put your database 
> (Access) in a web accessible directory.

All of this is true enough. My point was simply that using a single-key
system as simple as the one you proposed is not nearly as secure as using a
publicly tested, well-known encryption algorithm, ideally a public-private
key system. Of course, even with that, you have to secure the keys well.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
phone: (202) 797-5496
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Your ad could be here. Monies from ads go to support these lists and provide more 
resources for the community. http://www.fusionauthority.com/ads.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to